Behavioral task
behavioral1
Sample
1924-56-0x00000000005C0000-0x00000000005CC000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1924-56-0x00000000005C0000-0x00000000005CC000-memory.exe
Resource
win10v2004-20221111-en
General
-
Target
1924-56-0x00000000005C0000-0x00000000005CC000-memory.dmp
-
Size
48KB
-
MD5
63ac11583d62727804218c3cdc3932fe
-
SHA1
a8eeccc40526098f8e559c2eba05c76f2b6e60a5
-
SHA256
9b7c4cf1c31e4a814d49c7e397736527eb0ca2906b72166cdf86841f6b7e5904
-
SHA512
17e10ae93eee04a854d0bff6e3bba059c629b1a3009ff058323067543d3d34045ebca33d445166d4de6c93d5c81be4765cc8d52208c20d6caa02c491bdd7b44b
-
SSDEEP
384:tweXCQIreJig/8Z7SS1fEBpng6tgL2IBPZVmRvR6JZlbw8hqIusZzZGF:SLq411eRpcnud
Malware Config
Extracted
njrat
0.7d
HacKed
veprex.hopto.org:5552
83b7e568a26ebaedf41a9c3879a1e2a8
-
reg_key
83b7e568a26ebaedf41a9c3879a1e2a8
-
splitter
|'|'|
Signatures
-
Njrat family
Files
-
1924-56-0x00000000005C0000-0x00000000005CC000-memory.dmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ